{"id":1670,"date":"2026-03-03T19:57:20","date_gmt":"2026-03-03T19:57:20","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/"},"modified":"2026-03-03T19:57:20","modified_gmt":"2026-03-03T19:57:20","slug":"the-fbi-is-using-ai-to-hack-targets","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/","title":{"rendered":"The FBI Is Using AI to Hack Targets"},"content":{"rendered":"<p>The FBI is using artificial intelligence in what it describes as \u201cremote access operations,\u201d FBI parlance for hacking, according to an FBI official.The comments, given at a national security and AI conference 404 Media was attending, give an unusually candid admission of the FBI\u2019s use of hacking tools, which are often shrouded in secrecy.\u201cMy team, one of the parts of our capabilities mission is our computer network operations program, where we&#8217;re doing on-network or remote access operations,\u201d Todd Hemmen, the deputy assistant director of the FBI\u2019s Cyber Division, said on Tuesday. Remote access operations is a turn of phrase for when the FBI remotely enters a computer network; in other words, when the agency hacks into a target.\ud83d\udca1Do you know anything else about FBI or other agencies&#8217; hacking tools? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.Specifically for those sorts of operations \u201cAI has tremendous benefits, not entirely different than the benefits that are being enjoyed by some of our adversarial nationstate actors,\u201d he continued. He pointed to \u201cthe speed at which we are able to conduct\u2014autonomous isn&#8217;t the right word\u2014but AI enabled attacks.\u201dHemmen was speaking on a panel about how criminals and nationstates are using AI to power scams and fraud. When 404 Media asked a follow-up question for more details on how the FBI is using AI for its remote access operations, Hemmen said he wouldn\u2019t give any case specific examples, but spoke more broadly about the benefits.<\/p>\n<p>He pointed to reconnaissance, when a hacker scopes out a target network to in turn find potential ways to break into it. \u201cYou have very large attack surfaces; AI can scan those surfaces very, very efficiently. So it&#8217;s that initial scanning in terms of where are the vulnerabilities, how can I exploit and gain access,\u201d he said. He added AI then can be used for moving laterally through the network, which is when a hacker moves from one position to another to access more data or capabilities. While a threat actor\u2014a cybercriminal or an adversary nationstate\u2014may then steal data, \u201cwe have a different mission obviously, but I see AI as having applicability across, again, every single tactic that would be relevant to those on-network operations, So it&#8217;s a game changer in that sense.\u201dIn his role, Hemmen oversees the division\u2019s technical tools. The FBI did not respond to a request for additional comment.Relatively little is known about what hacking tools the FBI deploys, what sort of cases it decides to deploy them in, and for what exact purpose. Over the years journalists have pieced together parts, though. Previously, the FBI used a \u201cnon-public\u201d vulnerability to hack suspected visitors of a dark web child abuse site. The FBI\u2019s Remote Operations Unit (ROU) used classified hacking tools\u2014which are typically reserved for intelligence gathering operations\u2014in ordinary criminal investigations, potentially complicating criminal defendants\u2019 opportunity to scrutinize the evidence collected against them. The FBI has also used hacking tools, euphemistically called network investigative techniques, to investigate bomb threats and the users of a privacy-focused email service. The FBI also purchased hacking tools from the notorious spyware vendor NSO Group and explored using them against phones in the U.S., The New York Times previously reported.<\/p>\n","protected":false},"excerpt":{"rendered":"<div>AI is a \u201cgame changer\u201d for what the FBI calls remote access operations, an FBI official said in response to a 404 Media question on Tuesday.<\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[1,565,274,13],"tags":[3],"class_list":["post-1670","post","type-post","status-publish","format-standard","hentry","category-ai-and-ml","category-fbi","category-hacking","category-news","tag-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The FBI Is Using AI to Hack Targets - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The FBI Is Using AI to Hack Targets - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"AI is a \u201cgame changer\u201d for what the FBI calls remote access operations, an FBI official said in response to a 404 Media question on Tuesday.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-03T19:57:20+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"The FBI Is Using AI to Hack Targets\",\"datePublished\":\"2026-03-03T19:57:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/\"},\"wordCount\":578,\"keywords\":[\"AI\"],\"articleSection\":[\"AI and ML\",\"FBI\",\"hacking\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/\",\"name\":\"The FBI Is Using AI to Hack Targets - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"datePublished\":\"2026-03-03T19:57:20+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The FBI Is Using AI to Hack Targets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The FBI Is Using AI to Hack Targets - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/","og_locale":"en_US","og_type":"article","og_title":"The FBI Is Using AI to Hack Targets - Imperative Business Ventures Limited","og_description":"AI is a \u201cgame changer\u201d for what the FBI calls remote access operations, an FBI official said in response to a 404 Media question on Tuesday.","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-03-03T19:57:20+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"The FBI Is Using AI to Hack Targets","datePublished":"2026-03-03T19:57:20+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/"},"wordCount":578,"keywords":["AI"],"articleSection":["AI and ML","FBI","hacking","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/","name":"The FBI Is Using AI to Hack Targets - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"datePublished":"2026-03-03T19:57:20+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/03\/the-fbi-is-using-ai-to-hack-targets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"The FBI Is Using AI to Hack Targets"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=1670"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/1670\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=1670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=1670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=1670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}